@inproceedings{78eb2decbd96413a89462de5f7607e4f,
title = "Threshold Implementations of all 3×3 and 4×4 S-boxes",
abstract = "Side-channel attacks have proven many hardware implementations of cryptographic algorithms to be vulnerable. A recently proposed masking method, based on secret sharing and multi-party computation methods, introduces a set of sufficient requirements for implementations to be provably resistant against first-order DPA with minimal assumptions on the hardware. The original paper doesn{\textquoteright}t describe how to construct the Boolean functions that are to be used in the implementation. In this paper, we derive the functions for all invertible 3 ×3, 4 ×4 S-boxes and the 6 ×4 DES S-boxes. Our methods and observations can also be used to accelerate the search for sharings of larger (e.g. 8 ×8) S-boxes. Finally, we investigate the cost of such protection.",
keywords = "EWI-24463, IR-89341, METIS-302703, SCS-Cybersecurity",
author = "Beg{\"u}l Bilgin and S.I. Nikova and Vincent Rijmen and Ventzislav Nikov and Georg St{\"u}tz",
note = "10.1007/978-3-642-33027-8_5 ; Cryptographic Hardware and Embedded Systems, CHES 2012 ; Conference date: 09-09-2012 Through 12-09-2012",
year = "2012",
doi = "10.1007/978-3-642-33027-8_5",
language = "Undefined",
isbn = "978-3-642-33026-1",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "76--91",
editor = "E. Prouff and P. Schaumont",
booktitle = "Cryptographic Hardware and Embedded Systems, CHES 2012",
address = "Germany",
}